Object-oriented approach to specify secret sharing protocol in security critical system using formal method
Computers are being used increasingly in different security critical systems like electronic commerce and health care systems. The formal analysis turns out to be very useful that its application should be routine for financial and security critical systems. To win the confidence of users of a secur...
Saved in:
Main Authors: | , , |
---|---|
Format: | Article |
Published: |
Faculty of Computer Science and Information Technology, University of Malaya
2000
|
Subjects: | |
Online Access: | http://eprints.um.edu.my/25849/ https://ejournal.um.edu.my/index.php/MJCS/article/view/5823 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my.um.eprints.25849 |
---|---|
record_format |
eprints |
spelling |
my.um.eprints.258492021-04-12T01:41:13Z http://eprints.um.edu.my/25849/ Object-oriented approach to specify secret sharing protocol in security critical system using formal method Yew, Kok Meng Rahman, Mohammad Zahidur Lee, Sai Peck QA75 Electronic computers. Computer science Computers are being used increasingly in different security critical systems like electronic commerce and health care systems. The formal analysis turns out to be very useful that its application should be routine for financial and security critical systems. To win the confidence of users of a secured system, like secure secret sharing protocol, there is no other alternative than the formal method. In this paper, we first briefly introduce the secret sharing system and Object-Z formal specification tool. Then we present our design of the secret sharing scheme. In our model, the participating user and the information sharing authority dealer are modeled. To exchange information securely between users and the dealer, private channels are used. Broadcast channel is used for open information exchange. Both types of channels have been modeled. The model is formally specified by introducing the concept of combine object for collecting secret shares and for checking whether they lie in the perfect secret sharing scheme. We finally conclude with our experience. Faculty of Computer Science and Information Technology, University of Malaya 2000 Article PeerReviewed Yew, Kok Meng and Rahman, Mohammad Zahidur and Lee, Sai Peck (2000) Object-oriented approach to specify secret sharing protocol in security critical system using formal method. Malaysian Journal of Computer Science, 13 (1). pp. 76-83. ISSN 0127-9084 https://ejournal.um.edu.my/index.php/MJCS/article/view/5823 |
institution |
Universiti Malaya |
building |
UM Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Malaya |
content_source |
UM Research Repository |
url_provider |
http://eprints.um.edu.my/ |
topic |
QA75 Electronic computers. Computer science |
spellingShingle |
QA75 Electronic computers. Computer science Yew, Kok Meng Rahman, Mohammad Zahidur Lee, Sai Peck Object-oriented approach to specify secret sharing protocol in security critical system using formal method |
description |
Computers are being used increasingly in different security critical systems like electronic commerce and health care systems. The formal analysis turns out to be very useful that its application should be routine for financial and security critical systems. To win the confidence of users of a secured system, like secure secret sharing protocol, there is no other alternative than the formal method. In this paper, we first briefly introduce the secret sharing system and Object-Z formal specification tool. Then we present our design of the secret sharing scheme. In our model, the participating user and the information sharing authority dealer are modeled. To exchange information securely between users and the dealer, private channels are used. Broadcast channel is used for open information exchange. Both types of channels have been modeled. The model is formally specified by introducing the concept of combine object for collecting secret shares and for checking whether they lie in the perfect secret sharing scheme. We finally conclude with our experience. |
format |
Article |
author |
Yew, Kok Meng Rahman, Mohammad Zahidur Lee, Sai Peck |
author_facet |
Yew, Kok Meng Rahman, Mohammad Zahidur Lee, Sai Peck |
author_sort |
Yew, Kok Meng |
title |
Object-oriented approach to specify secret sharing protocol in security critical system using formal method |
title_short |
Object-oriented approach to specify secret sharing protocol in security critical system using formal method |
title_full |
Object-oriented approach to specify secret sharing protocol in security critical system using formal method |
title_fullStr |
Object-oriented approach to specify secret sharing protocol in security critical system using formal method |
title_full_unstemmed |
Object-oriented approach to specify secret sharing protocol in security critical system using formal method |
title_sort |
object-oriented approach to specify secret sharing protocol in security critical system using formal method |
publisher |
Faculty of Computer Science and Information Technology, University of Malaya |
publishDate |
2000 |
url |
http://eprints.um.edu.my/25849/ https://ejournal.um.edu.my/index.php/MJCS/article/view/5823 |
_version_ |
1696976591388672000 |
score |
13.211869 |